{"id":"https://openalex.org/W2905439514","doi":"https://doi.org/10.1007/978-3-030-05755-8_11","title":"Fast Implementation for SM4 Cipher Algorithm Based on Bit-Slice Technology","display_name":"Fast Implementation for SM4 Cipher Algorithm Based on Bit-Slice Technology","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2905439514","doi":"https://doi.org/10.1007/978-3-030-05755-8_11","mag":"2905439514"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-05755-8_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-05755-8_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006261789","display_name":"Jingbin Zhang","orcid":"https://orcid.org/0000-0003-2065-1823"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingbin Zhang","raw_affiliation_strings":["School of Electronics Engineering and Computer Science, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering and Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087581233","display_name":"Meng Ma","orcid":"https://orcid.org/0000-0003-2396-469X"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Ma","raw_affiliation_strings":["National Engineering Research Center for Software Engineering, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Software Engineering, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100338689","display_name":"Ping Wang","orcid":"https://orcid.org/0000-0002-8854-2079"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Wang","raw_affiliation_strings":["Key Laboratory of High Confidence Software Technologies, Peking University, Ministry of Education, Beijing, China","National Engineering Research Center for Software Engineering, Peking University, Beijing, China","School of Software and Microelectronics, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of High Confidence Software Technologies, Peking University, Ministry of Education, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"National Engineering Research Center for Software Engineering, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Software and Microelectronics, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006261789"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2719,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.61810191,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"104","last_page":"113"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8453732132911682},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7122560143470764},{"id":"https://openalex.org/keywords/operand","display_name":"Operand","score":0.6061517596244812},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.503147304058075},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.49869728088378906},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4963534474372864},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4547743499279022},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.42202863097190857},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3510347008705139},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19047081470489502},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08839577436447144}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8453732132911682},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7122560143470764},{"id":"https://openalex.org/C55526617","wikidata":"https://www.wikidata.org/wiki/Q719375","display_name":"Operand","level":2,"score":0.6061517596244812},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.503147304058075},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.49869728088378906},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4963534474372864},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4547743499279022},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.42202863097190857},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3510347008705139},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19047081470489502},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08839577436447144}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-05755-8_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-05755-8_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W89245623","https://openalex.org/W1547345548","https://openalex.org/W1548516269","https://openalex.org/W1603169531","https://openalex.org/W1652166504","https://openalex.org/W1834566299","https://openalex.org/W2149174385","https://openalex.org/W2278507260","https://openalex.org/W2281317404","https://openalex.org/W2604844934","https://openalex.org/W2620636316","https://openalex.org/W2787433815"],"related_works":["https://openalex.org/W2090865818","https://openalex.org/W2204275588","https://openalex.org/W2047405250","https://openalex.org/W4240897725","https://openalex.org/W2015194765","https://openalex.org/W2039921003","https://openalex.org/W2562402966","https://openalex.org/W1508882069","https://openalex.org/W2027150535","https://openalex.org/W1972921083"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
